A criminal act detection system may include a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and sending information pertaining to the conduct consistent with a criminal act to one or more of the personal electronic devices.
|
5. A criminal act detection system, comprising:
a device processor; and
a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps:
receiving data from a plurality of geographically distributed personal electronic devices;
determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and
sending one or more commands pertaining to the conduct consistent with a criminal act to regulate operation of one or more control systems in a geographic area affected by the conduct consistent with a criminal act;
wherein the data includes location information of the conduct consistent with a criminal act;
wherein the conduct consistent with a criminal act is one or more gunshots;
wherein the location information includes the location from which the one or more gunshots were fired; and
wherein the non-transitory computer readable medium further includes instructions for:
determining location information of the location from which multiple gunshots have been fired by comparing a differential between volume levels detected for two gunshots by the plurality of personal electronic devices; and
identifying a device with a volume differential below a predetermined threshold as being at the location from which the multiple gunshots were fired.
1. A criminal act detection system, comprising:
a device processor; and
a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps:
receiving data, including sound data and location data, from a plurality of geographically distributed personal electronic devices;
determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and
sending information pertaining to the conduct consistent with a criminal act to one or more of the personal electronic devices;
wherein the non-transitory computer readable medium further includes instructions for determining location information of the conduct consistent with a criminal act based on the location data;
wherein the conduct consistent with a criminal act is one or more gunshots;
wherein the location information includes the location from which the one or more gunshots were fired; and
wherein the non-transitory computer readable medium further includes instructions for:
determining location information of the location from which multiple gunshots have been fired by comparing a differential between volume levels detected for two gunshots by the plurality of personal electronic devices; and
identifying a device with the smallest volume differential as being closest to the location from which the multiple gunshots were fired.
15. A criminal act detection system, comprising:
a device processor; and
a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps:
receiving data from a plurality of geographically distributed personal electronic devices;
determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and
sending one or more commands pertaining to the conduct consistent with a criminal act to regulate operation of one or more control systems in a geographic area affected by the conduct consistent with a criminal act;
wherein the data received from the plurality of personal electronic devices includes location information of the conduct consistent with a criminal act;
wherein the conduct consistent with a criminal act is one or more gunshots;
wherein the location information includes the location from which the one or more gunshots were fired; and
wherein the non-transitory computer readable medium further includes instructions for:
determining location information of the location from which multiple gunshots have been fired by comparing a differential between volume levels detected for two gunshots by the plurality of personal electronic devices; and
identifying a device with a volume differential below a predetermined threshold as being at the location from which the multiple gunshots were fired;
wherein the one or more commands pertaining to the conduct consistent with a criminal act include instructions for regulating operation of one or more building system including at least one of door locks; window locks; elevators; lights; and heating, ventilation, and air conditioning (HVAC).
2. The system of
3. The system of
an escape route for users of the one or more personal electronic devices;
an identification of shelter for users of the one or more personal electronic devices;
an identification of resources for users of the one or more personal electronic devices;
one or more warning messages for users of the one or more personal electronic devices; and
one or more commands to operate features of the one or more personal electronic devices.
4. The system of
recording ambient noise;
recording data from phone sensors;
producing a siren sound;
silencing one or more sound emitting functions;
turning on phone lights; and
turning off phone lights.
6. The system of
7. The system of
8. The system of
9. The system of
10. The system of
11. The system of
12. The system of
13. The system of
14. The system of
identifying a device with the smallest volume differential as being closest to the location from which the multiple gunshots were fired.
16. The system of
17. The system of
18. The system of
19. The system of
20. The system of
|
This application is a continuation of Alonzo III et al., U.S. patent application Ser. No. 16/453,923, filed Jun. 26, 2019, and entitled “Criminal Act Detection System,” which claims priority to provisional patent application No. 62/753,400, filed on Oct. 31, 2018. The entire disclosures of the applications listed above are incorporated herein by reference.
The present disclosure generally relates to the detection of events using sensors in personal electronic devices and, more particularly, collectively utilizing data collected from a plurality of distributed personal electronic devices to determine the occurrence of events and providing a response to the determination that such events have occurred.
There are programs for detecting natural disasters, such as earthquakes. These programs include stationary seismic monitoring systems. They are not interactive with individuals in terms of providing information and assistance tailored to individuals or groups of individuals affected by such natural disasters. The information of where and when earthquakes occur is available, but it is not readily provided to the public with any particular context or guidance as to what those in the public who are affected by the disasters should do to best endure the event.
There are also systems that have been developed to detect criminal activity, such as an active shooter in a civilian locality. Such systems may include sensors deployed on official vehicles, such as police helicopters. However, the information collected and determined by such systems is not readily provided to the public.
There is a need in the art for a system and method that addresses the shortcomings discussed above. In particular, there is a need in the art for disaster and crime detection systems that are more readily accessible to and interactive with the public.
The present disclosure is directed to a system and methods for detecting events. The disclosed system may collect data from personal electronic devices, such as mobile phones, to detect the occurrence of natural disasters and/or criminal activity. Upon a determination that a natural disaster or criminal act has occurred, the system may send information, instructions, commands, or other communications to the personal electronic devices affected by the events, including the personal electronic devices from which the data was collected. The system may also send commands to third parties. Also, in some embodiments, the system may send commands to affect the operation of one or more control systems proximate to the location of the detected event.
In one aspect, the present disclosure is directed to a disaster detection system. The system may include a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that a disaster has occurred; and sending information pertaining to the disaster to one or more of the personal electronic devices.
In another aspect, the present disclosure is directed to a disaster detection system, comprising: a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that a natural disaster has occurred; and sending one or more commands pertaining to the natural disaster to one or more third parties.
In another aspect, the present disclosure is directed to a disaster detection system, comprising: a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that a natural disaster has occurred; and sending one or more commands pertaining to the natural disaster to regulate operation of one or more control systems in a geographic area affected by the natural disaster.
In another aspect, the present disclosure is directed to a criminal act detection system, comprising: a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and sending information pertaining to the conduct consistent with a criminal act to one or more of the personal electronic devices.
In another aspect, the present disclosure is directed to a criminal act detection system, comprising: a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and sending one or more commands pertaining to the conduct consistent with a criminal act to one or more third parties.
In another aspect, the present disclosure is directed to a criminal act detection system, comprising: a device processor; and a non-transitory computer readable medium including instructions executable by the device processor to perform the following steps: receiving data from a plurality of geographically distributed personal electronic devices; determining, based on the data received from the personal electronic devices, that conduct consistent with a criminal act has occurred; and sending one or more commands pertaining to the conduct consistent with a criminal act to regulate operation of one or more control systems in a geographic area affected by the conduct consistent with a criminal act.
Other systems, methods, features, and advantages of the disclosure will be, or will become, apparent to one of ordinary skill in the art upon examination of the following figures and detailed description. It is intended that all such additional systems, methods, features, and advantages be included within this description and this summary, be within the scope of the disclosure, and be protected by the following claims.
The invention can be better understood with reference to the following drawings and description. The components in the figures are not necessarily to scale, emphasis instead being placed upon illustrating the principles of the invention. Moreover, in the figures, like reference numerals designate corresponding parts throughout the different views.
The present disclosure is directed to an event detection system. The system may utilize sensors commonly incorporated into personal electronic devices to collect data from the surrounding environment. The system may collect such data from a plurality of geographically distributed personal electronic devices. In some embodiments, one or more of the plurality of personal electronic devices may be mobile phones. Mobile phones may be well suited for such data collection, since most people carry mobile phones on their person and keep them turned on (i.e., to receive telephone calls, text messages, emails, and/or other means of communication, such as social media alerts). With the devices turned on, other sensors may be utilized to collect data from the surroundings.
For example, in some embodiments, gyroscopes and/or accelerometers in the devices may be used to detect shaking, for example, from an earthquake. Although personal electronic devices experience shaking and vibrations during everyday use (e.g., from walking or riding in a vehicle), in an earthquake, many phones in proximity to one another will experience the same or similar shaking pattern at the same time. When the same or similar shaking pattern is detected in multiple personal electronic devices at the same time, it can be determined that an earthquake has been detected. From data collected from multiple personal electronic devices, it can be determined the magnitude, epicenter, and affected area (e.g., how far from the epicenter can the shaking be determined as hazardous) of an earthquake. In some cases, slight differences between the times at which the data is recorded may also indicate location, direction, or magnitude of the event. For example, as a shock wave from an earthquake propagates, it will be recorded slightly earlier by users' phones that are closer to the epicenter, and slightly later by users' phones that are further from the epicenter. These differences in timing may be used to determine information about the event.
In some embodiments, the microphone of the personal electronic devices may record ambient noise. Such sound monitoring may be used to detect gunshots. Sound data collected from multiple personal electronic devices may be used to determine the location from which the shots were fired. This may assist authorities in finding an active shooter in a civilian area. This detection system may also be used in a militarized area as well, e.g., to determine the location of a sniper. In a military setting, the personal electronic devices from which data is collected may need to be other than mobile phones, which are not always carried by soldiers. For example, the microphones in soldiers' communications equipment (“comms”) may be implemented to collect sound data to triangulate the location of a shooter.
In addition to gyroscope/accelerometer data and/or microphone data, global positioning system (GPS) data from the personal electronic devices may also be collected and included in the analysis to determine the occurrence, location, and magnitude of events.
As shown in
As shown in
Data may be collected by these sensors in a plurality of personal electronic devices. Although three phones are shown for purposes of illustration, it will be understood that system 100 may collect data from many personal electronic devices. In an area where people are gathered, such as a sporting event, theatre, shopping center, etc., data may be collected from hundreds or thousands of personal electronic devices. In a metropolitan area, data may be collected from tens or hundreds of thousands of personal electronic devices. These sensors may each be of the type conventionally provided in smart phones for example.
A step 104 illustrates a process of determining, based on the data received from the personal electronic devices in step 102, that an event has occurred. For example, in some embodiments, step 104 may determine that a natural disaster has occurred (step 135), such as an earthquake (step 140). In some embodiments, step 104 may determine that a criminal act has occurred (step 145), such as gunshots from an active shooter (step 150). The systems disclosed herein may be configured to detect any type of disaster, naturally occurring, or otherwise. For example, detectable disasters may include not only earthquakes, but also other types of natural disasters, such as tornados, hurricanes, forest fires, and/or floods, as well as other types of disasters, such as explosions, chemical leaks, etc. For purposes of explanation, the disclosed disaster detection system will be discussed in the context of an earthquake detection system. Similarly, it will be understood that the disclosed systems may be configured to detect any type of criminal act, including bombings, deployment of biological weapons, deployment of chemical weapons, etc. For purposes of explanation, the disclosed criminal act detection system will be discussed in the context of an active shooter.
In order to make such determinations, the system may include a central controller, which may include a device processor and a non-transitory computer readable medium including instructions executable by the device processor. Features and capabilities of such components are discussed in greater detail below.
Further, as shown in
In some embodiments, the information pertaining to the detected event may include an identification of an escape route (step 161). For example, system 100 may determine one or more viable escape routes from the location of a personal electronic device to an area that is less (or not) affected by the detected event. The escape route may be selected and directly input into a mapping app on the personal electronic device so that the user of the personal electronic device may follow the navigation instructions of the identified escape route.
In some embodiments, the information pertaining to the detected event may include an identification of shelter for users of the one or more personal electronic devices (step 162). For example, system 100 may identify a shelter, such as a sturdy building, underground facility, or other location of safety that is in the geographic area proximate to the personal electronic device.
In some embodiments, the information pertaining to the detected event may include an identification of resources for users of the one or more personal electronic devices (step 163). For example, system 100 may send messages identifying resources, such as gas stations, grocery stores, banking facilities, and hardware stores, as well as water, electrical power, medical treatment, and other supplies and services provided by disaster support organizations.
In some embodiments, the information pertaining to the detected event may include one or more warning messages for users of the one or more personal electronic devices (step 164). Such warning messages may alert users to an event that has occurred or is ongoing in their area. Such messages may identify the type of event and, to the extent known, the location of the event.
In some embodiments, the information pertaining to the detected event may include one or more commands to operate features of the one or more personal electronic devices (step 165), for example by turning the features on or off.
In some cases, the commands may be to activate various features of the personal electronic devices. For example, in some embodiments, the information may include commands for phones in the area to begin recording data from the phones' microphones or other sensors. In some embodiments, the information may include an instruction for the personal electronic devices to emit a siren or other audible alert. In some cases, the sirens could be used as a panic alarm alerting others to the distress of the device user. In other cases, it could be to warn the user themselves. Further, in some cases, the system may be configured to send instructions to all devices in a locality to emit a high pitched siren. Collectively, multiple devices emitting such a harsh sound may be incapacitating, or at least distracting, to a perpetrator, such as an active shooter. In some embodiments, the information may include instructions for turning on the lights of the phone, such as a flashlight. By turning on the flash light, the user may be able to find their phone in the dark; also, the flash light may light up a dark room. If multiple users have the same or similar functions operated, the whole room could be lit up by the phones' flashlights. Also, the collection of lights could be used to blind a would be assailant.
In some embodiments, the information may include commands to deactivate various features of the personal electronic devices. For example, in some cases, the information may include instructions to silence one or more sound emitting functions of the phones. Additionally, or alternatively, the information may include commands to turn off the phones' lights and screens. Turning off such features may conserve battery life of the phones. In addition, by turning off audible and visual features of the phones, it may assist users to avoid detection by an active shooter.
In some embodiments, the responsive action taken may include sending one or more commands pertaining to the natural disaster or criminal act to one or more third parties (step 170).
In some embodiments, system 100 may be configured to send one or more commands pertaining to the natural disaster or criminal act, including instructions to dispatch first responders to a location affected by the natural disaster or criminal act (step 171). For example, system 100 may be configured to send instructions for the dispatch of police, firefighters, medical providers, etc.
In some embodiments, the one or more commands pertaining to the natural disaster or criminal act may include one or more alerts to one or more organizations that provide support for natural disasters (step 172). For example, such alerts may include notifications to support organizations, such as the Federal Emergency Management Agency (FEMA), the American Red Cross, and various other organizations that provide aid in the event of emergency situations.
In some embodiments, the one or more commands pertaining to the natural disaster or criminal act may include one or more orders of disaster recovery supplies (step 173). For example, system 100 may be configured to send orders for supplies, such as water, blankets, electrical power, and other supplies and services.
In some embodiments, action taken in response to detection of a disaster or criminal act may be preventative action taken in order to prevent further harm by the disaster or criminal (step 180). For example, in some embodiments, the responsive action taken may include sending one or more commands pertaining to the natural disaster or criminal act to regulate operation of one or more control systems in a geographic area affected by the natural disaster.
In some embodiments, the one or more commands pertaining to the natural disaster or criminal act include instructions for regulating operation of one or more building systems. For example, the one or more building systems may include at least one of door locks 181, window locks 182; elevators 183; lights 184; and heating, ventilation, and air conditioning (HVAC) 185. Other such building systems may include security systems, electricity, video systems, audio systems, Wi-Fi, etc. Such control of building systems may be executed via the Internet of Things (IoT). That is, those systems may be networked, and thus, controllable via an Internet connection.
These building systems may be controlled to assist people in and around the buildings that house them. For example, in some cases, door locks may be unlocked to allow people to enter safer areas, such as a basement area. In other cases, door locks may be locked in order to prevent an active shooter from entering an area of the building in which people are located. Similarly, lights, window locks, elevators, and HVAC systems may be turned on or off depending on what would be most beneficial to the occupants of the building or others who may take refuge in the building during or after a natural disaster or criminal act.
In some embodiments, the one or more commands pertaining to the natural disaster or criminal act may include instructions for regulating operation of one or more transportation systems. For example, such transportation systems may include at least one of traffic lights 186, public transportation 187, air traffic control 188, and roadway management 190. In some embodiments, the one or more commands pertaining to the natural disaster or criminal act include instructions for regulating operation of one or more public utilities 189. As with the building systems, the operation of the transportation systems and/or public utilities may be regulated to benefit the people in the area affected by the natural disaster or criminal act. For example, it may be beneficial to change a section of highway system so that both northbound and southbound lanes are used for southbound traffic in order to facilitate an evacuation away from a natural disaster located to the north of the section of highway in question. In some cases, it may be beneficial to shut down all public transportation, in order to limit the ability of a criminal to escape and evade capture by the police. In other cases, it may be beneficial to dispatch more buses than usual in order to facilitate an evacuation in the event of a natural disaster.
The effects of the earthquake generally diminish with distance from epicenter 205. Accordingly, mobile devices disposed closer to epicenter 205 may detect more severe vibrations than mobile devices that are disposed further away from epicenter 205. As shown in
A second phone 222 is disposed within second region 220. Three wavy lines 224 are shown in both sides of second phone 222 (and other phones within second region 220). These three wavy lines 224, by having fewer lines, illustrate less severe vibration experienced by second phone 222 as compared to first phone 212. Similarly, a third phone 232 is disposed within third region 230. Two wavy lines 234 are shown on both sides of third phone 232 (and other phones within third region 230) to illustrate less severe vibration experienced by third phone 232 as compared to that experienced by second phone 222. Also, a fourth phone 242 is disposed within fourth region 240. A single wavy line is shown on both sides of fourth phone 242 (and other phones within fourth region 240) to illustrate less severe vibration experienced by fourth phone 242 as compared to third phone 232.
It will be noted that, for purposes of illustration and clarity, only 10 or fewer phones are shown in each region of
Controller 400 may include various computing and communications hardware. For example, controller 400 may include a device processor and a non-transitory computer readable medium including instructions executable by the device processor. The computer readable medium may include any suitable computer readable medium, such as a memory, such as RAM, ROM, flash memory, or any other type of memory known in the art. Controller 400 may include other computing hardware, such as servers, integrated circuits, displays, etc.
Further, controller 400 may include networking hardware configured to interface with other nodes of a network, such as a LAN, WLAN, or other networks. For example, controller 400 may include a receiver and a transmitter. (It will be appreciated that, in some embodiments, the receiver and transmitter may be combined in a transceiver.)
As shown in
Similarly, a third dashed line 415 indicates the receipt of information by controller 400 from second phone 222, and a fourth dashed line 420 indicates the delivery of information from controller 400 to second phone 222. In some embodiments, the platform of communication between controller 400 and second phone 222 may be the same as, or similar to, the platform of communication between controller 400 and first phone 212. In some embodiments, the platforms of communication may be different from one another.
Further, a fifth dashed line 425 indicates the receipt of information by controller 400 from third phone 232, and a sixth dashed line 430 indicates the delivery of information from controller 400 to third phone 232. In some embodiments, the platform of communication between controller 400 and third phone 232 may be the same as, or similar to, the platform of communication between controller 400 and first phone 212. In some embodiments, the platforms of communication may be different from one another.
Also, a seventh dashed line 435 indicates the receipt of information by controller 400 from fourth phone 242, and an eighth dashed line 440 indicates the delivery of information from controller 400 to fourth phone 242. In some embodiments, the platform of communication between controller 400 and fourth phone 242 may be the same as, or similar to, the platform of communication between controller 400 and first phone 212. In some embodiments, the platforms of communication may be different from one another.
The computer readable medium may further include instructions to determine the occurrence of a natural disaster (step 505). In some embodiments, the system may be configured to detect the occurrence of a natural disaster, such as an earthquake. In such embodiments, the computer readable medium may include instructions for determining location information pertaining to the disaster based on GPS information collected from the plurality of personal electronic devices. For example, in embodiments where the natural disaster is an earthquake, the location information may include the location of the epicenter of the earthquake. In addition, the computer readable medium may further include instructions for determining the magnitude of the earthquake based on the data received from the plurality of geographically distributed personal electronic devices.
As also shown in
As also shown in
As also shown in
In some embodiments, the same information and/or commands may be sent to all devices and parties upon detection of an event. For example, an alert that an earthquake has occurred may be sent with the same content to all devices in a locality deemed to be potentially affected by the earthquake. In some embodiments, different information may be sent to different devices or parties depending on their location with respect to the detected event. For example, a suggested escape route may be sent to devices determined to be a moderate distance from the epicenter of an earthquake. Whereas, for devices determined to be close to the epicenter of an earthquake, there may be too much destruction to provide an escape route, and thus, information may be sent identifying a nearby shelter (e.g., a sturdy and/or earthquake resistant building).
Accordingly, the non-transitory computer readable medium includes instructions for sending different information pertaining to the natural disaster to different personal electronic devices, based on the location information of the natural disaster, depending on the location of each personal electronic device with respect to the natural disaster. Further, the non-transitory computer readable medium may include instructions for sending different commands pertaining to the natural disaster to different control systems, based on the location information of the natural disaster, depending on the location of each control system with respect to the natural disaster.
In addition, as also shown in
As shown in
In addition, in some embodiments, the location of shooter may be determined based on a differential volume between two or more gunshots. That is to say that, because people tend to scatter at the sound of gunfire, devices in the line of fire will likely record separate gunshots at a different volume. In contrast, the shooter's own phone will likely record each of the gunshots at substantially the same volume. Accordingly, of all devices from which data is collected, the device that records the gunshots with the smallest differential volume can be determined to be at the location from which the shots were fired. Similarly, the timing at which the gunshots are recorded by each device will vary depending on how close or far the device is from the shooter. The system may be configured to utilize these differences in timing to determine information about the shooter. Also, the sound signature may be used to determine the type of gun and ammunition used.
Accordingly, in some embodiments, the computer readable medium further includes instructions for determining location information of the location from which multiple gunshots have been fired by comparing a differential between volume levels detected for two gunshots by the plurality of personal electronic devices; and identifying a device with the smallest volume differential as being at, or closest to, the location from which the multiple gunshots were fired.
As also shown in
As also shown in
As also shown in
In some embodiments, the same information and/or commands may be sent to all devices and parties upon detection of an event. For example, an alert that conduct consistent with a crime is ongoing may be sent with the same content to all devices in a locality deemed to be potentially affected by the conduct consistent with a crime. In some embodiments, different information may be sent to different devices or parties depending on their location with respect to the detected event. For example, a suggested escape route may be sent to devices determined to be a moderate distance from an active shooting. Whereas, for devices determined to be close to the shooting, it may be less risky to simply find shelter, and thus, information may be sent identifying a nearby shelter (e.g., a nearby lockable room in a building).
Accordingly, the non-transitory computer readable medium includes instructions for sending different information pertaining to the conduct consistent with a crime to different personal electronic devices, based on the location information of the conduct, depending on the location of each personal electronic device with respect to the conduct. Further, the non-transitory computer readable medium may include instructions for sending different commands pertaining to the conduct consistent with a criminal act to different control systems, based on the location information of the conduct, depending on the location of each control system with respect to the conduct.
In addition, as also shown in
The embodiments discussed herein may make use of methods and systems in artificial intelligence to improve efficiency and effectiveness of the disclosed systems. As used herein, “artificial intelligence” may include any known methods in machine learning and related fields. As examples, artificial intelligence may include systems and methods used in deep learning and machine vision.
While various embodiments have been described, the description is intended to be exemplary, rather than limiting, and it will be apparent to those of ordinary skill in the art that many more embodiments and implementations are possible that are within the scope of the embodiments. Although many possible combinations of features are shown in the accompanying figures and discussed in this detailed description, many other combinations of the disclosed features are possible. Any feature of any embodiment may be used in combination with, or substituted for, any other feature or element in any other embodiment unless specifically restricted. Therefore, it will be understood that any of the features shown and/or discussed in the present disclosure may be implemented together in any suitable combination. Accordingly, the embodiments are not to be restricted except in light of the attached claims and their equivalents. Also, various modifications and changes may be made within the scope of the attached claims.
Wheeler, James A., Alonzo, III, Edward Manuel
Patent | Priority | Assignee | Title |
Patent | Priority | Assignee | Title |
10930125, | Oct 31 2018 | UNITED SERVICES AUTOMOBILE ASSOCIATION USAA | Criminal act detection system |
9509424, | Jul 11 2011 | NTT DoCoMo, Inc | Communication terminal and information providing method |
20020138298, | |||
20080088434, | |||
20100325473, | |||
20110130636, | |||
20110169633, | |||
20120063270, | |||
20130036175, | |||
20150111524, | |||
20150241582, | |||
20160119424, | |||
20160157032, | |||
20170036967, | |||
20170311131, | |||
20170358196, | |||
20180053394, | |||
20180293867, | |||
20180364375, |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Jun 18 2019 | ALONZO, EDWARD MANUEL, III | UIPCO, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 059475 | /0137 | |
Jun 18 2019 | WHEELER, JAMES A | UIPCO, LLC | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 059475 | /0137 | |
Jan 21 2021 | United Services Automobile Association (USAA) | (assignment on the face of the patent) | / | |||
Nov 04 2022 | UIPCO, LLC | UNITED SERVICES AUTOMOBILE ASSOCIATION USAA | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 061702 | /0188 |
Date | Maintenance Fee Events |
Jan 21 2021 | BIG: Entity status set to Undiscounted (note the period is included in the code). |
Date | Maintenance Schedule |
Jan 31 2026 | 4 years fee payment window open |
Jul 31 2026 | 6 months grace period start (w surcharge) |
Jan 31 2027 | patent expiry (for year 4) |
Jan 31 2029 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jan 31 2030 | 8 years fee payment window open |
Jul 31 2030 | 6 months grace period start (w surcharge) |
Jan 31 2031 | patent expiry (for year 8) |
Jan 31 2033 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jan 31 2034 | 12 years fee payment window open |
Jul 31 2034 | 6 months grace period start (w surcharge) |
Jan 31 2035 | patent expiry (for year 12) |
Jan 31 2037 | 2 years to revive unintentionally abandoned end. (for year 12) |